<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Switch configuration for dmz vlan segregation in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/switch-configuration-for-dmz-vlan-segregation/m-p/787549#M1008261</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When I ping the ASA from the client, I can see the connection being built and torn down on the ASA as expected.  I can ping the client from the ASA without a problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The client gateway is set to the ip address of the vlan on the switch (.1), not the ASA interface (.2).  As I think about it though, that can't be right since packets can't have the switch as a destination since as an L2, it can't route them (and a default-gateway on the switch can't work because of the multiple interface problem).  I will change this and try again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 05 Apr 2007 10:55:20 GMT</pubDate>
    <dc:creator>professorguy</dc:creator>
    <dc:date>2007-04-05T10:55:20Z</dc:date>
    <item>
      <title>Switch configuration for dmz vlan segregation</title>
      <link>https://community.cisco.com/t5/network-security/switch-configuration-for-dmz-vlan-segregation/m-p/787544#M1008256</link>
      <description>&lt;P&gt;I have a 24-port Cisco 2950 on my ASA 5520 DMZ interface.  It is segregated into 23 vlans:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface FastEthernet0/1&lt;/P&gt;&lt;P&gt; switchport access vlan 101&lt;/P&gt;&lt;P&gt; ip address 192.168.101.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0/2&lt;/P&gt;&lt;P&gt; switchport access vlan 102&lt;/P&gt;&lt;P&gt; ip address 192.168.102.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;interface FastEthernet0/24&lt;/P&gt;&lt;P&gt; switchport mode trunk&lt;/P&gt;&lt;P&gt; switchport trunk allowed vlan 101-123&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then there's 23 subinterfaces on my ASA dmz interface:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2.101&lt;/P&gt;&lt;P&gt; nameif dmz-101&lt;/P&gt;&lt;P&gt; vlan 101&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 192.168.101.2 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigagitEthernet0/2.102&lt;/P&gt;&lt;P&gt; nameif dmz-102&lt;/P&gt;&lt;P&gt; vlan 102&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 192.168.102.2 255.255.255.0&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;route outside 0 0&lt;/P&gt;&lt;P&gt;global (outside) 1 &amp;lt;PUBLIC_IP&amp;gt;&lt;/P&gt;&lt;P&gt;nat (dmz-101) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;nat (dmz-102) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The asdm Packet Tracer reports that a client on vlan 109 (192.168.109.101) hitting interface dmz-109 will pass to an outside ip:80 (www).  However, when I try to hit ip:80, no joy.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I scrape off all the subinterfaces and put the switch to a default configuration (every port on vlan 1), it works fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What should the switch config look like to actually communicate correctly with the ASA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 09:55:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/switch-configuration-for-dmz-vlan-segregation/m-p/787544#M1008256</guid>
      <dc:creator>professorguy</dc:creator>
      <dc:date>2019-03-11T09:55:57Z</dc:date>
    </item>
    <item>
      <title>Re: Switch configuration for dmz vlan segregation</title>
      <link>https://community.cisco.com/t5/network-security/switch-configuration-for-dmz-vlan-segregation/m-p/787545#M1008257</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Perhaps a more specific question is in order:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Everything I read says the default gateway set up on the switch must correspond to the interface of the ASA.  But the switch can have only one default-gateway while the interface on the ASA has 23 different addresses.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is the default gateway for the switch?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Apr 2007 14:04:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/switch-configuration-for-dmz-vlan-segregation/m-p/787545#M1008257</guid>
      <dc:creator>professorguy</dc:creator>
      <dc:date>2007-04-04T14:04:38Z</dc:date>
    </item>
    <item>
      <title>Re: Switch configuration for dmz vlan segregation</title>
      <link>https://community.cisco.com/t5/network-security/switch-configuration-for-dmz-vlan-segregation/m-p/787546#M1008258</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The 'default-gateway' on the switch you are referring to is for the switches' management traffic.  (ie: telnet, snmp, etc..) It does not affect through traffic (ie: routed traffic).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The default-gateway should be the interface on the ASA which corresponds to the interface VLAN you are using for management of the switch.  By default, that is VLAN 1, but can be changed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sincerely,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;David.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Apr 2007 16:47:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/switch-configuration-for-dmz-vlan-segregation/m-p/787546#M1008258</guid>
      <dc:creator>David White</dc:creator>
      <dc:date>2007-04-04T16:47:40Z</dc:date>
    </item>
    <item>
      <title>Re: Switch configuration for dmz vlan segregation</title>
      <link>https://community.cisco.com/t5/network-security/switch-configuration-for-dmz-vlan-segregation/m-p/787547#M1008259</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you David.  That explains the configurations I see on some of our other devices.  I have a management VLAN which is the native vlan on our trunks and all point to the same gateway on our core router.  Now I understand how to make the DMZ switch report to the NOC as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So the default-gateway is not the problem here.  What is preventing the communications?  Let me recap:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can ping the client on the DMZ switch from the ASA.  I can ping the ASA from the DMZ client.  I can ping outside from the ASA.  Asdm Packet Tracker reports that packets will route from the dmz client to a web site outside.  But the dmz client cannot hit the web site outside (by IP without DNS).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does anyone have a vlan/subinterface configuration between a switch and the ASA that is working?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Apr 2007 17:31:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/switch-configuration-for-dmz-vlan-segregation/m-p/787547#M1008259</guid>
      <dc:creator>professorguy</dc:creator>
      <dc:date>2007-04-04T17:31:57Z</dc:date>
    </item>
    <item>
      <title>Re: Switch configuration for dmz vlan segregation</title>
      <link>https://community.cisco.com/t5/network-security/switch-configuration-for-dmz-vlan-segregation/m-p/787548#M1008260</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If the client (I assume located off the switch somewhere) can ping the ASA's IP (which should obviously be on the same VLAN as the client), then you correctly configured trunking on the switch and ASA, and that is not your problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Did you set the client's default gateway to be that of the ASA?  If so, then the next step is to check the syslogs on the ASA to see if the connection is getting built.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The config you pasted in looks fine.  Trying pinging from the client to the ASA's default router, and enable "debug icmp trace" on the ASA and see if you see the ICMP Echo and ICMP Echo-reply packets.  That will also help narrow down where the issue is.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sincerely,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;David.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Apr 2007 00:26:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/switch-configuration-for-dmz-vlan-segregation/m-p/787548#M1008260</guid>
      <dc:creator>David White</dc:creator>
      <dc:date>2007-04-05T00:26:40Z</dc:date>
    </item>
    <item>
      <title>Re: Switch configuration for dmz vlan segregation</title>
      <link>https://community.cisco.com/t5/network-security/switch-configuration-for-dmz-vlan-segregation/m-p/787549#M1008261</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When I ping the ASA from the client, I can see the connection being built and torn down on the ASA as expected.  I can ping the client from the ASA without a problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The client gateway is set to the ip address of the vlan on the switch (.1), not the ASA interface (.2).  As I think about it though, that can't be right since packets can't have the switch as a destination since as an L2, it can't route them (and a default-gateway on the switch can't work because of the multiple interface problem).  I will change this and try again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Apr 2007 10:55:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/switch-configuration-for-dmz-vlan-segregation/m-p/787549#M1008261</guid>
      <dc:creator>professorguy</dc:creator>
      <dc:date>2007-04-05T10:55:20Z</dc:date>
    </item>
    <item>
      <title>Re: Switch configuration for dmz vlan segregation</title>
      <link>https://community.cisco.com/t5/network-security/switch-configuration-for-dmz-vlan-segregation/m-p/787550#M1008262</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;David is now my favorite person.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Much joy.  Each port on the switch is a separate VLAN with no inter-VLAN routing.  If a DMZ server is compromised, it cannot attack other DMZ servers (at least it'll be harder).  Each vlan on the switch has an ip on a subnet, which is on the same subnet as the subinterface on the ASA.  Then the client gets a (static) ip on that subnet, but the default gateway for that client must be the ASA subinterface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Works like a charm!  Thanks again, David.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Apr 2007 11:22:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/switch-configuration-for-dmz-vlan-segregation/m-p/787550#M1008262</guid>
      <dc:creator>professorguy</dc:creator>
      <dc:date>2007-04-05T11:22:55Z</dc:date>
    </item>
    <item>
      <title>Re: Switch configuration for dmz vlan segregation</title>
      <link>https://community.cisco.com/t5/network-security/switch-configuration-for-dmz-vlan-segregation/m-p/787551#M1008263</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Glad to hear it professorguy.  Thanks for letting us know!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sincerely,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;David.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Apr 2007 12:53:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/switch-configuration-for-dmz-vlan-segregation/m-p/787551#M1008263</guid>
      <dc:creator>David White</dc:creator>
      <dc:date>2007-04-05T12:53:34Z</dc:date>
    </item>
  </channel>
</rss>

